Serveur d'exploration sur la recherche en informatique en Lorraine - Exploration (Accueil)

Index « Titre (en) » - entrée « security »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
securing < security < sedation  Facettes :

List of bibliographic references indexed by security

Number of relevant bibliographic references: 220.
[0-20] [0 - 20][0 - 50][20-40]
Ident.Authors (with country if any)Title
000057 (2016-03) Steve Kremer [France] ; Peter R Nne [France]To Du or not to Du: A Security Analysis of Du-Vote
000073 (2016-02) Özgür Dagdelen [Allemagne] ; David Galindo [France] ; Pascal Véron [France] ; Sidi Mohamed El Yousfi Alaoui [Allemagne] ; Pierre-Louis Cayrel [Allemagne]Extended security arguments for signature schemes
000237 (2015-11-10) Houari Mahfoud [Algérie] ; Abdessamad Imine [France]Efficient Querying of XML Data Through Arbitrary Security Views
000240 (2015-11-09) Gaëtan Hurel [France] ; Rémi Badonnel [France] ; Abdelkader Lahmadi [France] ; Olivier Festor [France]Behavioral and Dynamic Security Functions Chaining For Android Devices
000255 (2015-11) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]From Security Protocols to Pushdown Automata
000270 (2015-10-20) Frédéric Dadeau [France] ; Elizabeta Fourneret [France]Experience report on Model-Based Testing of Security Components
000464 (2015-07) Rohit Sharma [France]Security Management of Cloud-Native Applications
000488 (2015-06-22) Steven Latré [Belgique] ; Marinos Charalambides [Royaume-Uni] ; Jérôme François [France] ; Corinna Schmitt [Suisse] ; Burkhard Stiller [Suisse]Intelligent Mechanisms for Network Configuration and Security : 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015.
000543 (2015-05-11) Gaëtan Hurel [France] ; Rémi Badonnel [France] ; Abdelkader Lahmadi [France] ; Olivier Festor [France]Towards Cloud-Based Compositions of Security Functions For Mobile Devices
000596 (2015-04) Vincent Cheval [France] ; Véronique Cortier [France]Timing attacks in security protocols: symbolic framework and proof techniques
000636 (2015-02-09) Juan Pablo Timpanaro [France] ; Thibault Cholez [France] ; Isabelle Chrisment [France] ; Olivier Festor [France]Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security
000642 (2015-01-29) Guillaume Scerri [France]Proofs of security protocols revisited
000780 (2015) Frédéric Dadeau [France] ; Pierre-Cyrille Héam [France] ; Rafik Kheddam [France] ; Ghazi Maatoug [France] ; Michael Rusinowitch [France]Model‐based mutation testing from security protocols in HLPSL
000875 (2014-11-21) Cyrille Wiedling [France]Formal Verification of Advanced Families of Security Protocols: E-Voting and APIs
000919 (2014-09-30) Jérôme François [Luxembourg (pays)] ; Lautaro Dolberg [Luxembourg (pays)] ; Olivier Festor [France] ; Thomas Engel [Luxembourg (pays)]Network Security through Software Defined Networking: a Survey
000951 (2014-09-13) Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000980 (2014-09) Rémy Chrétien [France] ; Véronique Cortier [France] ; Stéphanie Delaune [France]Typing messages for free in security protocols: the~case of equivalence properties
000A35 (2014-07-17) Michaël Rusinowitch [France]Automated Verification of Security Protocols and Services
000A40 (2014-07-14) Elio Goettelmann [France] ; Nicolas Mayer [Luxembourg (pays)] ; Claude Godart [France]Integrating Security Risk Management into Business Process Management for the Cloud
000A71 (2014-06-30) Gaëtan Hurel [France] ; Rémi Badonnel [France] ; Abdelkader Lahmadi [France] ; Olivier Festor [France]Outsourcing Mobile Security in the Cloud
000A83 (2014-06-27) Elio Goettelmann [France] ; Karim Dahman [France] ; Benjamin Gateau [Luxembourg (pays)] ; Eric Dubois [Luxembourg (pays)] ; Claude Godart [France]A Security Risk Assessment Model for Business Process Deployment in the Cloud

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i -k "security" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i  \
                -Sk "security" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    indexItem
   |index=    Title.i
   |clé=    security
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022